Interview

Robot Automation

Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec

In this Spotlight Podcast, we speak with David Brumley, the Chief Executive Officer at the security firm ForAllSecure and an expert on the use of machine learning and automation to cyber security problems. We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and elsewhere is driving investment in automation.

Episode 159: Deep Fakes and Election (in)Security with ZeroFOX

In this weeks podcast, we delve into the myriad challenges to election security with Sam Small, the Chief Security Officer at the firm ZeroFOX

Cult of the Dead Cow DC6

Episode 148: Joseph Menn on Cult of the Dead Cow also Veracode CEO Sam King on InfoSec’s Leaky Talent Pipeline

In this week’s episode of the podcast: Joseph Menn’s new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World hit store shelves this week. We reprise our March interview with Joe and talk about the origins of CDC. Also: is the talent pipeline for information security empty, or has it sprung a leak? We’re joined by Veracode CEO Sam King to talk about one of the top problems facing organizations: how to cultivate and keep information security talent.

Episode 147: Forty Year Old GPS Satellites offer a Warning about securing the Internet of Things

A programming glitch in GPS satellite software grounded planes in China and other countries. But what does it tell us about the security of the Internet of Things? Bill Malik of Trend Micro joins us to discuss.

Interview: securing the University using NIST’s Cyber Framework

College and university campuses are notoriously difficult to tame. In this one-on-one interview, I speak with Plamen Martinov, the Chief Information Security Officer for the Biological Sciences Division at the University of Chicago about how his organization has used NIST’s Cybersecurity Framework to create a security lingua franca at UChicago and improve the organization’s security posture.